[1] |
Feng Qi, He Debiao, Luo Min, Li Li.
Efficient Two-Party SM2 Signing Protocol for Mobile Internet
[J]. Journal of Computer Research and Development, 2020, 57(10): 2136-2146.
|
[2] |
Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan.
A Link Prediction Approach in Temporal Networks Based on Game Theory
[J]. Journal of Computer Research and Development, 2019, 56(9): 1953-1964.
|
[3] |
Yu Yaxin, Wang Lei.
An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network
[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311.
|
[4] |
Liu Yiran, Ke Junming, Jiang Han, Song Xiangfu.
Improvement of the PoS Consensus Mechanism in Blockchain Based on Shapley Value
[J]. Journal of Computer Research and Development, 2018, 55(10): 2208-2218.
|
[5] |
Wang Wenhua, Wang Tian, Wu Qun, Wang Guojun, Jia Weijia.
Survey of Delay-Constrained Data Collection with Mobile Elements in WSNs
[J]. Journal of Computer Research and Development, 2017, 54(3): 474-492.
|
[6] |
Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang.
Advanced Persistent Threats Detection Game with Expert System for Cloud
[J]. Journal of Computer Research and Development, 2017, 54(10): 2344-2355.
|
[7] |
Meng Fei, Lan Julong, Hu Yuxiang.
A Cooperative Game Based Data Center Backbone Network Bandwidth Allocation Policy
[J]. Journal of Computer Research and Development, 2016, 53(6): 1306-1313.
|
[8] |
Wu Fan, Zheng Zhenzhe.
Game Theory Based Spectrum Dynamic Management
[J]. Journal of Computer Research and Development, 2016, 53(1): 38-52.
|
[9] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[10] |
Dong Rongsheng, Sun Dongdong, Guo Yunchuan, and Liu Jianming.
Power Control and Vertical Handoff Based on Evolutionary Game Theory
[J]. Journal of Computer Research and Development, 2014, 51(6): 1185-1198.
|
[11] |
Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, and Zhu Jianming.
Game-Theoretic Mechanism for Cryptographic Protocol
[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
|
[12] |
Yang Hailu, Zhang Jianpei, and Yang Jing.
Community-Based Bidirectional Feedback System for Hybrid Worm Containment in Mobile Internet
[J]. Journal of Computer Research and Development, 2014, 51(2): 311-324.
|
[13] |
He Yunhua, Sun Limin, Yang Weidong, Li Zhi, Li Hong.
Privacy Preserving for Node Trajectory in VSN: A Game-Theoretic Analysis Based Approach
[J]. Journal of Computer Research and Development, 2014, 51(11): 2483-2492.
|
[14] |
Li Zhiyuan, Bi Junlei, Wang Ruchuan.
Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks
[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328.
|
[15] |
Zhang En, and Cai Yongquan.
Rational Secure Two-Party Computation Protocol
[J]. , 2013, 50(7): 1409-1417.
|